Let’s examine what distinguishes SASE from SSE, and why both concepts are so fundamental to building cloud-centric security and networking architectures of the future.more →
Organizational attack surfaces are expanding, giving attackers bigger targets to hit. It’s a sneaky battle and one that organizations have to fight. By understanding the attack surface, expanding your intelligence capabilities, and getting to know the enemy, you’ll be prepared for the fight ahead.more →
A DDoS (Distributed Denial of Service) attack seeks to exhaust resources in a given infrastructure (nowadays, mostly cloud-based systems), to hinder the operation of its services and applications.
There are different types of DDoS attacks. In volumetric assaults, the target becomes overloaded due to the sudden increase in traffic volume, disrupting it and preventing legitimate users from accessing the service.more →
While the COVID-19 pandemic has disrupted business models around the world, the adoption of modern application and cloud technologies continues to grow.
Here we are sharing a blog from our partners Sumo Logic. Their Continuous Intelligence Report provides an inside look into the state of the modern application technology stack, including changing trends in cloud and application adoption and usage by customers, and the impact of COVID-19 as an accelerant for digital transformation efforts.more →
This month we are sharing a blog from our partner Netskope who explain the current threat trends in the cloud.
Bad actors are constantly looking for new ways to attack the enterprise. There are many known patterns of execution that are still very effective such as phishing, BEC scams, vulnerability searches on exposed websites/systems, lack of hardened systems, and misconfigurations left unaddressed/unscreened before releasing to production, leaving company’s assets exposed.more →
Living In the Clouds
You really can’t talk about IT these days without mentioning cloud or something-as-a-service. For some it is hard to remember a time when we did not have the cloud, at least in some basic form. But I do remember the beginnings, and for me the whole cloud journey has come full circle.more →
Ever wondered what it’s like to experience a cyber-attack? Want to know what the warning signs are? This article recreates a typical ransomware attack scenario of what a business may go through in the first 24 hours when experiencing a data breach.
Fictional high street shoe retailer Shoes-4-U, with branches in every town nationwide, has recently received an email from a supplier.more →
In a business world that is facing an ever-increasing and intensifying threat landscape, enterprises must re-evaluate their current perimeter security approach. This month we are sharing a blog from one of the pioneers of the “Zero Trust” mentality, Akamai. We take a look at how VPNs are out of date and why we should all be adopting the ‘never trust, always verify’more →